Skip to main content

Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3304))

Abstract

Recently, two generic watermarking protocols were proposed, based on a popular zero-knowledge identification protocol. In this paper, we show that both protocols are flawed and therefore fail to achieve their purpose of allowing a prover to prove to a verifier of his ownership of a watermarked image. We also give some suggestions to fix these flaws.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adelsbach, A., Sadeghi, A.-R.: Zero Knowledge Watermark Detection and Proof of Ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  3. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  4. Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. In: 19th Annual ACM Symposium on the Theory of Computing, pp. 210–217 (1987)

    Google Scholar 

  5. Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. Journal of Cryptology 1(2), 77–94 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  6. Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proc. IEEE 87, 1079–1107 (1999)

    Article  Google Scholar 

  7. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  8. Pfitzman, B., Sadeghi, A.R.: Coin-Based Anonymous Fingerprinting. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 150–163. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  9. Pfitzman, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 84–95. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  10. Pfitzman, B., Waidner, W.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 88–102. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  11. Quisquater, J.-J., Guillou, L.C., Berson, T.A.: How to Explain Zero-Knowledge Protocols to Your Children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 628–631. Springer, Heidelberg (1990)

    Google Scholar 

  12. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  13. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Chichester (1996)

    MATH  Google Scholar 

  14. Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia Data Embedding and Watermarking Technologies. Proc. IEEE 86, 1064–1087 (1998)

    Article  Google Scholar 

  15. Then, P.H.H., Wang, Y.C.: Towards Generic Zero Knowledge Protocol for Blind Watermark Detection. In: International Conference on IT in Asia (CITA 2003), pp. 278–282 (2003)

    Google Scholar 

  16. Then, H.H.P., Wang, Y.C.: Towards Generic Detection Scheme in Zero Knowledge Protocol for Blind Watermark Detection. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 570–580. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Voyatzis, G., Pitas, I.: The Use of Watermarks in the Protection of Digital Multimedia Products. Proc. IEEE 87, 1197–1207 (1999)

    Article  Google Scholar 

  18. Wagner, N.R.: Fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 18–22 (1983)

    Google Scholar 

  19. Wolfang, R., Podilchuk, C., Delp, E.: Perceptual Watermarks for Digital Images and Video. Proc. IEEE 87, 1108–1126 (1999)

    Article  Google Scholar 

  20. Zhao, J., Koch, E.: Embedding Robust Labels Into Images For Copyright Protection. In: International Congress on Intellectual Property Rights for Specialized Information. Knowledge and New Technologies, Vienna (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Phan, R.C.W., Ling, HC. (2005). Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31805-7_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24839-2

  • Online ISBN: 978-3-540-31805-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics